Authenticated相关论文
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient t
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access d......
DH密钥交换协议作为传统的密钥交换协议,具有无法抵御中间人攻击的缺陷。STS密钥交换协议和MTI密钥交换协议在DH密钥交换协议上添......
分析了常见的密钥协商协议,基于同态加密机制和NTRU公钥密码体制,提出了基于NTRU的可认证同态密钥协商协议.该协议建立的会话密钥是可......
为了抵抗主动攻击,2010年陈家琪等人提出了一个可认证的无证书三方密钥协商协议,但该密钥协议不能抵抗被动敌手的攻击,也不能满足......
Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrit......
Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue t......
The design and analysis of authenticated key exchange protocol is an important problem in information security area. At ......
Dragonfly is Password Authenticated Key Exchange protocol that uses a shared session key to authenticate parties based o......